Proceedings of the Hardware and Architectural Support for Security and Privacy 2016 2016
DOI: 10.1145/2948618.2948627
|View full text |Cite
|
Sign up to set email alerts
|

Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

Abstract: Smartphones are now frequently used by end-users as the portals to cloud-based services, and smartphones are easily stolen or co-opted by an attacker. Beyond the initial login mechanism, it is highly desirable to re-authenticate endusers who are continuing to access security-critical services and data, whether in the cloud or in the smartphone. But attackers who have gained access to a logged-in smartphone have no incentive to re-authenticate, so this must be done in an automatic, non-bypassable way. Hence, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 59 publications
(37 citation statements)
references
References 28 publications
0
36
0
1
Order By: Relevance
“…However, since the accuracy is not 100%, it may not authenticate the real user of the smartphone. To overcome this issue, these systems are used as a second authentication system and reauthentication [57] or continuous authentication systems [71,72]. In this method, username and password are still utilized for authentication; however, for continuous authentication of the user during sessions, the phone keeps track of the user's touching and tapping behavior.…”
Section: Hidden Information Inferring Applicationsmentioning
confidence: 99%
“…However, since the accuracy is not 100%, it may not authenticate the real user of the smartphone. To overcome this issue, these systems are used as a second authentication system and reauthentication [57] or continuous authentication systems [71,72]. In this method, username and password are still utilized for authentication; however, for continuous authentication of the user during sessions, the phone keeps track of the user's touching and tapping behavior.…”
Section: Hidden Information Inferring Applicationsmentioning
confidence: 99%
“…Recently, implicit continuous authentication for smartphones called iAuth [35] which leverages motions recorded in the smartphone and wearable device was introduced, and was later extended to SmarterYou [36] with contextawareness. Their schemes are based on the idea that the behavioral patterns collected in both devices are distinct from each person and each moving context.…”
Section: • Wearauth Reduces the Communication Overhead By Us-mentioning
confidence: 99%
“…For example, fingerprint identification needs users to put their finger on the scanner. Hence, these approaches requiring user compliance cannot achieve continuous and implicit identification [11] which was an ultimate goal of our proposed system to overcome.…”
Section: Related Workmentioning
confidence: 99%
“…Mare et al [22] proposed a two-fold legitimate user identification model in which the signals sent from a bracelet worn on the user's wrist are correlated with the operations of the terminal to confirm the continued presence of the user if the two movements correlate according to a few coarse-grained actions. Lee and Lee [11] proposed a legitimate user identification system named iAuth for implicit but continuous user identification in which the end user is identified based on their behavioral characteristics by leveraging the built-in sensors. ey have built a system which gives better identification than previously possible using sensor data from multiple devices and machine learning techniques.…”
mentioning
confidence: 99%